On the Extent and Nature of Software Reuse in Open Source Java Projects
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Clubedu Clubdigitalhome Clubdev Strahlung
Nr. 165/Juni 2020 € 5,00 ISSN 1022-1611 · Politik digital aktiv mitgestalten Politik digital aktiv mitgestalten CLUBEDU Wien Teleteaching mit Windows CLUBDIGITALHOME XnView U-2623 CLUBDEV Visual Studio Code Spaces STRAHLUNG Strahlung Schwingkreise Fehleinschätzungen P.b.b. 16Z040679 M ClubComputer, Siccardsburggasse 4/1/22 1100 1100 4/1/22 Siccardsburggasse ClubComputer, M 16Z040679 P.b.b. Inhalt Liebe Leserinnen und Leser! Franz Fiala LIESMICH Dass diese Ausgabe mit etwas Verspätung hergestellt wurde, liegt an diesem winzigen 1 Cover Etwas, das sich zwischen die Menschen geschoben hat und das nicht nur Veranstal- Franz Fiala Fußball und Kunst, tungen verunmöglicht hat, sondern auch den Grenzübertritt zur Slowakei, wo sich die am meisten be- Druckerei der PCNEWS befindet. Dass diese Pandemie auch einen Zusammenhang zu troffen vom Corona- unserem Jahresregenten, dem Thema „Strahlung“, hat, darauf wären wir wohl auch Virus—oder von mit viel Phantasie nicht gekommen. Unwissen macht vieles möglich. docj eher von 5G? Bild: „Strahlung“ ist größtenteils unsichtbar—so wie ein Virus—und die Beschäftigung mit Simpl am 2.1.20202 diesem Thema sollte unser Wissen vertiefen und uns gegen die um sich greifende Wis- senschaftsfeindlichkeit mit abgesichertem Wissen immunisieren. 2 Liebe Leser, Inhalt Es liegt in der Natur der Sache, dass „lehren“ und „belehren“ verwandte Begriffe und Franz Fiala die Vermittlung komplexerer Zusammenhänge von bildungsfernen Schichten eher als 3 Impressum, Autoren, Inserenten, Zweiteres empfunden und daher auch abgelehnt wird und sie gleichzeitig eine verein- Services, Web 2020 fachte Gegenwelt der Verschwörungstheorien und alternativen Fakten errichten. IGITAL OCIETY Typisch für Wissenschaftsgegner ist das Postulieren nicht vorhandener Zusammen- D S hänge, eine „Dummheit zweiter Art“, die meist die „Dummheit der ersten Art“, näm- 4 Politik digital aktiv mitgestalten lich das Nicht-Verstehen von Zusammenhängen voraussetzt. -
Jedit: Isabelle/Jedit
jEdit ∀ = Isabelle α λ β → Isabelle/jEdit Makarius Wenzel 5 December 2013 Abstract Isabelle/jEdit is a fully-featured Prover IDE, based on Isabelle/Scala and the jEdit text editor. This document provides an overview of general principles and its main IDE functionality. i Isabelle's user interface is no advance over LCF's, which is widely condemned as \user-unfriendly": hard to use, bewildering to begin- ners. Hence the interest in proof editors, where a proof can be con- structed and modified rule-by-rule using windows, mouse, and menus. But Edinburgh LCF was invented because real proofs require millions of inferences. Sophisticated tools | rules, tactics and tacticals, the language ML, the logics themselves | are hard to learn, yet they are essential. We may demand a mouse, but we need better education and training. Lawrence C. Paulson, \Isabelle: The Next 700 Theorem Provers" Acknowledgements Research and implementation of concepts around PIDE and Isabelle/jEdit has started around 2008 and was kindly supported by: • TU M¨unchen http://www.in.tum.de • BMBF http://www.bmbf.de • Universit´eParis-Sud http://www.u-psud.fr • Digiteo http://www.digiteo.fr • ANR http://www.agence-nationale-recherche.fr Contents 1 Introduction1 1.1 Concepts and terminology....................1 1.2 The Isabelle/jEdit Prover IDE..................2 1.2.1 Documentation......................3 1.2.2 Plugins...........................4 1.2.3 Options..........................4 1.2.4 Keymaps..........................5 1.2.5 Look-and-feel.......................5 2 Prover IDE functionality7 2.1 File-system access.........................7 2.2 Text buffers and theories....................8 2.3 Prover output..........................9 2.4 Tooltips and hyperlinks.................... -
Empfehlungsliste Für Alternative Software
Alternative Programme und Dienste Aktuelle Tipps immer auf unserer Website: https://digitalcourage.de/digitale-selbstverteidigung statt Google Suche: Startpage, ixquick.eu, statt #%9 6SN oder Sk+pe 7chat8: =a!!er Metager, DuckDuckGo, etc. .XMPP) k>nnen vielen Programmen '.B. • https://www.startpage.com/ www.metager.de Pidgin • Sie lassen sich in !irefo" auch als Standard- • $infache $rkl?rung unter Suchmaschine einrichten. https://helmschrott.de/blog/jabber-in-3-minuten • https://www.pidgin.im/ kann auch viele anderen statt #nternet $"plorer $dge %hrome: 6essenger wie #%9 oder 6SN integrieren Firefox & auch mobil • https://www.mo'illa.org/de/firefo" statt Sk+pe 7:ideotelefonie8: 0itsi, %inp one, -ing, • $mpfohlene Add-ons: )TTPS $verywhere 1e!-T+ Privac+ Badger uBlock -rigin BetterPrivac+ • =itsi https://[email protected]/ Self-Destructing %ookies • 4inpone https://www.linphone.org/ - gibt es auch • !/r !ortgeschrittene: Re1uestPolic+ v2.3 4egac+ f/r Smartphone 5oScript • Ring https://ring.c"/ 7Android Win -S < 4inu"8 • Web0T% im Browser etliche Anbieter; l?sst sich statt -utlook: T underbird auch auf einem eigenen Server installieren • https://www.mo'illa.org/de/thunderbird • $rweiterungen: Enigmail #dentit+ statt Windows oder 6ac-S: G234%inux .5.B. %hooser SOGo %onnector 3!untu, Mageia/ • #nfos und )ilfe 7bei #nstallation und !ragen8 Passwort-Speicher: #eepass$ gibt es bei gan' vielen 4okalen Gruppen wie '.B. • https://www.keepass".org den 4inu" ;ser Groups 7siehe unten8 statt 6icrosoft -f(ce: %i!re&f'ce • https://mageia.org/ & https://www.ubuntu.com/ 75achfolger von -pen-f(ce8 • https://wiki.ubuntuusers.de/ ;buntu-!orum mit • https://de.libreof(ce.org detaillierten Antworten 'u vielen !ragen &nline-Dienste statt Windows 6edia Pla+er oder 9uicktime Pla+er: SM(Pla)er oder *%+ statt Google6aps: &penStreetMap • http://smpla+er.sourceforge.net/ SM*la+er • https://www.openstreetmap.org - kann hat ein paar !unktionen die :4% nicht hat auch Routenplanung !ahrradwege wie '.B. -
Ubuntu 16.04 LTS – Das Umfassende Handbuch 1145 Seiten, Gebunden, Mit DVD, 9
Wissen, wie’s geht. Leseprobe Ob Sie Einsteiger oder fortgeschrittener Ubuntu-User sind: Von der Installation bis zur Administration (Desktop und Server) zeigt Ihnen dieses Standardwerk, was Sie für Ihre Arbeit mit der beliebtesten Linux-Distribution benötigen. In dieser Leseprobe finden Sie nicht nur interessante Ubuntu-Grundlagen, sondern können außerdem einen Blick darauf werfen, wie tief Sie mit diesem Buch bei Bedarf in diese spannende Linux-Distribution eintauchen können. »Vorwort und Leitfaden für die Nutzung« »Die Wurzeln von Ubuntu« »Ubuntu ohne Risiko ausprobieren und Daten retten« »Daten sichern, migrieren und synchronisieren »Erste Schritte mit dem Unity-Desktop« »Datensicherung und Sicherheit« Inhaltsverzeichnis Index Der Autor Leseprobe weiterempfehlen Marcus Fischer Ubuntu 16.04 LTS – Das umfassende Handbuch 1145 Seiten, gebunden, mit DVD, 9. Auflage 2016 49,90 Euro, ISBN 978-3-8362-4299-8 www.rheinwerk-verlag.de/4214 Vorwort Vorwort Ein Betriebssystem auf GNU/Linux-Basis wurde früher lediglich von Spezialisten, Informa- tikern und besonders mutigen Nutzern verwendet. Technisch weit fortgeschritten, aber für einen Normalnutzer unbedienbar war die weit verbreitete Meinung. Dies änderte sich 2004, als einige erfahrene Entwickler sich zusammentaten, die Firma Canonical gründeten und ein kostenloses Betriebssystem namens Ubuntu entwickelten. Ubuntu sollte GNU/Linux aus der Expertenecke befreien und durch Benutzerfreundlichkeit einer breiten Öffentlichkeit zugänglich gemacht werden. Nicht alle Wege, die während der Entwicklung eingeschlagen wurden, waren von Erfolg ge- krönt, aber Ubuntu hat es wie kein zweites GNU/Linux-Betriebssystem geschafft, derart viele Nutzer von z. B. Windows zu einem Umstieg zu bewegen. Über die genauen Zahlen gibt es kein gesichertes Wissen, aber Canonical geht aufgrund der Downloadzahlen von inzwischen mehreren hundert Millionen Nutzern aus, die das System auf Notebooks, PCs, Servern und in virtuellen Maschinen nutzen. -
Complete Thesis
University of Groningen Applying patterns in embedded systems design for managing quality attributes and their trade-offs Feitosa, Daniel IMPORTANT NOTE: You are advised to consult the publisher's version (publisher's PDF) if you wish to cite from it. Please check the document version below. Document Version Publisher's PDF, also known as Version of record Publication date: 2019 Link to publication in University of Groningen/UMCG research database Citation for published version (APA): Feitosa, D. (2019). Applying patterns in embedded systems design for managing quality attributes and their trade-offs. University of Groningen. Copyright Other than for strictly personal use, it is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license (like Creative Commons). The publication may also be distributed here under the terms of Article 25fa of the Dutch Copyright Act, indicated by the “Taverne” license. More information can be found on the University of Groningen website: https://www.rug.nl/library/open-access/self-archiving-pure/taverne- amendment. Take-down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Downloaded from the University of Groningen/UMCG research database (Pure): http://www.rug.nl/research/portal. For technical reasons the number of authors shown on this cover page is limited to 10 maximum. Download date: 02-10-2021 Applying Patterns in Embedded Systems Design for managing Quality Attributes and their Trade-offs PhD thesis to obtain the degree of PhD at the University of Groningen on the authority of the Rector Magnificus Prof. -
Set-Up Environment
Set-up Environment Note: While this instruction utilises Windows to demonstrate the installation process, it does apply to other operating systems including Mac OS and Linux. Step 1. Install MinGW on Windows (skip this step if you use Mac OS or Linux) FYI: “MinGW” is a Windows implementation of C compiler that will convert your C source code into executable files. For Mac OS and Linux, C compilers should have already been installed. If you have not already installed “MinGW” for Windows, then use the other document <Install MinGW> on the same LMS page to install it. “MinGW” needs to be installed (or is not installed correctly) if you get the following error message: 'gcc' is not recognized as an internal or external command, operable program or batch file. Step 2.1 Check if you have Java SE 11 (JDK) installed FYI: You are not required to know what “JDK” stands for and what it means. Just bear in mind that it is a prerequisite to running jEdit 5.6.0. How do I know if I have Java installed? Windows: Select from the “Control Panel” => “Programs and Features” and check if you can find an entry called “Java(TM) SE Development Kit 11.0.10 (64-bit)” (or later). If you see such an entry, everything is fine and you can go to Step 3. Otherwise, you do not have Java installed and need to go to Step 2.2 Mac OS / Linux: Open “Terminal” and type “java -version”. If you can see the line: java version “11.0.10” or later, everything is fine and you can go to Step 3. -
Course 2: «Open Source Software (OSS) Engineering Data»
Course 2: «Open Source Software (OSS) Engineering Data». 1st Day: Metrics and Tools for Software Engineering in Open Source Software 1. Open Software / Hardware Technologies: Introduction to Open Source Software and related technologies. 2. Software Engineering FLOSS: Free Libre Open Source Software in Software Engineering. 3. Metrics for Open Source Software: product and project metrics and related tooling. 2nd Day: Research based on Open Source Software Data 4. Facilitating Metric for White-Box Reuse: we will discuss a metric derived from the analysis of Open Source Project which facilitates the white-box reuse (reuse based on the source code analysis). 5. Extracting components from Open-Source: The Component Adaptation Environment Approach (COPE): we will discuss the results of the OPEN-SME EU Research Project and in particular the COPE tool for extracting reusable components from Open Source Software. 6. Software Engineering Research based on Open Source Software Data: Data, A recent example: we will discuss a recent study of open source repository mailing lists for deriving implications for the evolution of an open source project. 7. Improving Component Coupling Information with Dynamic Profiling: we will discuss how dynamic profiling of an open source program can contribute towards its comprehension. In various points during the lectures students will be asked to carry out activities. Open Software / Hardware Technologies Ioannis Stamelos, Professor Nikolaos Konofaos, Associate Professor School of Informatics Aristotle University of Thessaloniki George Kakarontzas, Assistant Professor University of Thessaly 2018-2019 1 F/OSS - FLOSS Definition ● The traditional SW development model asks for a “closed member” team that develops proprietary source code. -
Arxiv:1702.08008V1 [Cs.SE] 26 Feb 2017
JETracer - A Framework for Java GUI Event Tracing Arthur-Jozsef Molnar Faculty of Mathematics and Computer Science, Babes¸-Bolyai University, Cluj-Napoca, Romania [email protected] Keywords: GUI, event, tracing, analysis, instrumentation, Java. Abstract: The present paper introduces the open-source Java Event Tracer (JETracer) framework for real-time tracing of GUI events within applications based on the AWT, Swing or SWT graphical toolkits. Our framework pro- vides a common event model for supported toolkits, the possibility of receiving GUI events in real-time, good performance in the case of complex target applications and the possibility of deployment over a network. The present paper provides the rationale for JETracer, presents related research and details its technical implemen- tation. An empirical evaluation where JETracer is used to trace GUI events within five popular, open-source applications is also presented. 1 INTRODUCTION 1400 professional developers regarding the strate- gies, tools and problems encountered by professionals The graphical user interface (GUI) is currently the when comprehending software. Among the most sig- most pervasive paradigm for human-computer inter- nificant findings are that developers usually interact action. With the continued proliferation of mobile with the target application’s GUI for finding the start- devices, GUI-driven applications remain the norm in ing point of further interaction as well as the use of today’s landscape of pervasive computing. Given IDE’s in parallel with more specialized tools. Of par- their virtual omnipresence and increasing complex- ticular note was the finding that ”industry developers ity across different platforms, it stands to reason that do not use dedicated program comprehension tools tools supporting their lifecycle must keep pace. -
Jedit 5.6 User's Guide the Jedit All-Volunteer Developer Team Jedit 5.6 User's Guide the Jedit All-Volunteer Developer Team
jEdit 5.6 User's Guide The jEdit all-volunteer developer team jEdit 5.6 User's Guide The jEdit all-volunteer developer team Legal Notice Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.1 or any later version published by the Free Software Foundation; with no “Invariant Sections”, “Front-Cover Texts” or “Back-Cover Texts”, each as defined in the license. A copy of the license can be found in the file COPYING.DOC.txt included with jEdit. I. Using jEdit ............................................................................................................... 1 1. Conventions ...................................................................................................... 2 2. Starting jEdit .................................................................................................... 3 Command Line Usage .................................................................................... 3 Miscellaneous Options ........................................................................... 4 Configuration Options ............................................................................ 4 Edit Server Options ............................................................................... 4 Java Virtual Machine Options ........................................................................ 5 3. jEdit Basics ...................................................................................................... 7 Interface Overview ....................................................................................... -
Isabelle/Jedit
jEdit ∀ = Isabelle α λ β → Isabelle/jEdit Makarius Wenzel 9 June 2019 Abstract Isabelle/jEdit is a fully-featured Prover IDE, based on Isabelle/Scala and the jEdit text editor. This document provides an overview of general principles and its main IDE functionality. i Isabelle’s user interface is no advance over LCF’s, which is widely condemned as “user-unfriendly”: hard to use, bewildering to begin- ners. Hence the interest in proof editors, where a proof can be con- structed and modified rule-by-rule using windows, mouse, and menus. But Edinburgh LCF was invented because real proofs require millions of inferences. Sophisticated tools — rules, tactics and tacticals, the language ML, the logics themselves — are hard to learn, yet they are essential. We may demand a mouse, but we need better education and training. Lawrence C. Paulson, “Isabelle: The Next 700 Theorem Provers” Acknowledgements Research and implementation of concepts around PIDE and Isabelle/jEdit has started in 2008 and was kindly supported by: • TU München https://www.in.tum.de • BMBF https://www.bmbf.de • Université Paris-Sud https://www.u-psud.fr • Digiteo https://www.digiteo.fr • ANR https://www.agence-nationale-recherche.fr Contents 1 Introduction1 1.1 Concepts and terminology....................1 1.2 The Isabelle/jEdit Prover IDE..................2 1.2.1 Documentation......................3 1.2.2 Plugins...........................4 1.2.3 Options..........................4 1.2.4 Keymaps..........................5 1.3 Command-line invocation....................5 1.4 GUI rendering...........................8 1.4.1 Look-and-feel.......................8 1.4.2 Displays with high resolution..............8 2 Augmented jEdit functionality 11 2.1 Dockable windows....................... -
Explaining Failures Using Software Dependences and Churn Metrics
Explaining Failures Using Software Dependences and Churn Metrics Nachiappan Nagappan 1, Thomas Ball 2 ABSTRACT Commercial software development is a complex task that requires a thorough understanding of the architecture of the software system. We analyze the Windows Server 2003 operating system in order to assess the relationship between its software dependences, churn metrics and post-release failures. Our analysis indicates the ability of software dependences and churn metrics to be efficient predictors of post-release failures. Further, we investigate the relationship between the software dependences and churn metrics and their ability to assess failure-proneness probabilities at statistically significant levels. Keywords Software dependences, Code churn, Failures, Failure-proneness, Multiple regression, Logistic regression. 1. INTRODUCTION The IEEE standard [18] for software engineering terminology defines “architecture” as the organizational structure of a system or component. Related is IEEE’s definition of architectural design [18] as the results of the process of defining a collection of hardware and software components and their interfaces to establish the framework (or architecture) for the development of a computer system. In any large-scale software development effort, a software architecture enables teams to work independently on different components in the architecture. Large software systems often are decomposed hierarchically in a tree, where the leaves of the tree provide lower level services that 1 Nachiappan Nagappan is a Researcher at Microsoft Research, One Microsoft Way, Redmond, WA 98052. Email: [email protected] 2 Thomas Ball is a Senior Researcher at Microsoft Research, One Microsoft Way, Redmond, WA 98052. Email: [email protected] components higher in the tree depend on. -
Periphery Structures in Open Source Software Development
Exploring the Impact of Socio-Technical Core- Periphery Structures in Open Source Software Development Chintan Amrit (Corresponding author) Faculty Management and Governance Department of Information Systems and Change Management University of Twente P.O. Box 217 7500 AE Enschede The Netherlands Telephone: 0031(0)53 4894064 Fax: +31(0)53 4892159 Email: [email protected] Prof Dr. Jos van Hillegersberg Department of Information Systems and Change Management University of Twente P.O. Box 217 7500 AE Enschede The Netherlands Telephone: 0031 (0) 53 4893513 Fax: +31 53 489 21 59 Email: j.vanhillegersberg @utwente.nl Acknowledgements We would like to thank Jeff Hicks for his extensive feedback that was really helpful in structuring the paper. Exploring the Impact of Socio-Technical Core- Periphery Structures in Open Source Software Development Abstract In this paper we apply the Social Network concept of Core-Periphery structure to the Socio-Technical structure of a software development team. We propose a Socio-Technical Pattern that can be used to locate emerging coordination problems in Open Source Projects. With the help of our tool and method called TESNA, we demonstrate a method to monitor the Socio-Technical Core-Periphery movement in Open Source projects. We then study the impact of different Core-Periphery movements on Open Source projects. We conclude that a steady Core-Periphery shift towards the core is beneficial to the project, while shifts away from the core are clearly not good. Furthermore, oscillatory shifts towards and away from the Core can be considered as an indication of the instability of the project.