The Qualitas Corpus: a Curated Collection of Java Code for Empirical Studies

Total Page:16

File Type:pdf, Size:1020Kb

The Qualitas Corpus: a Curated Collection of Java Code for Empirical Studies 2010 Asia Pacific Software Engineering Conference The Qualitas Corpus: A Curated Collection of Java Code for Empirical Studies Ewan Tempero∗, Craig Anslow§, Jens Dietrich†, Ted Han∗, Jing Li∗, Markus Lumpe‡, Hayden Melton∗, James Noble§ ∗Department of Computer Science, The University of Auckland Auckland, New Zealand. [email protected] † Massey University, School of Engineering and Advanced Technology Palmerston North, New Zealand. [email protected] ‡ Faculty of Information & Communication Technologies, Swinburne University of Technology Hawthorn, Australia. [email protected] § School of Engineering and Computer Science, Victoria University of Wellington Wellington, New Zealand. [email protected] Abstract—In order to increase our ability to use measure- there is still a non trivial cost to gathering the artifacts from ment to support software development practise we need to enough OSS projects to make a study useful. One of the do more analysis of code. However, empirical studies of code main goals of the Qualitas Corpus is to substantially reduce are expensive and their results are difficult to compare. We describe the Qualitas Corpus, a large curated collection of open the cost of performing large empirical studies of code. source Java systems. The corpus reduces the cost of performing However, just measuring code is not enough. We need large empirical studies of code and supports comparison of models explaining the relationship between the measure- measurements of the same artifacts. We discuss its design, ments and the quality attributes, and we need experiments organisation, and issues associated with its development. to validate those models. Validation does not come through Keywords-Empirical studies; curated code corpus; experi- a single experiment — experiments must be replicated. mental infrastructure Replication requires at least understanding of the relation- ship between the artifacts used in the different experiments. I. INTRODUCTION In some forms of experiments, we want to use the same Measurement is fundamental to engineering, however its artifacts so as to be able to compare results in a meaningful use in engineering software has been limited. While many way. This means we need to know in detail what artifacts software metrics have been proposed (e.g. [1]), few are are used in any experiment, meaning an ad hoc collection regularly used in industry to support decision making. A key of code whose contents is unknown is not sufficient. What reason for this is that our understanding of the relationship is needed is a curated collection of code artifacts. A second between measurements we know how to make and quality goal of the Qualitas Corpus is to support comparison of attributes, such as modifiability, understandability, extensi- measurements of the same artifacts, that is, to provide a bility, reusability, and testability, that we care about is poor. reference corpus for empirical studies of code. This is particularly true with respect to theories regarding The contributions of this paper are: characteristics of software structure such as encapsulation, inheritance, coupling, and cohesion. Traditional engineering • We present arguments for the provision of a reference disciplines have had hundreds or thousands of years of expe- corpus of code for empirical studies of code. rience of comparing measurements with quality outcomes, • We identify the issues regarding performing replication but central to this experience is the taking and sharing of of studies that analyse Java code. measurements and outcomes. In contrast there have been • We describe the Qualitas Corpus, a curated collection few useful measurements of code. In this paper we describe of Java code that reduces the cost and increases the the Qualitas Corpus, infrastructure that supports taking and replicability of empirical studies. sharing measurements of code artifacts. The rest of the paper is organised as follows. In the Barriers to measuring code and understanding what the next section we present the motivation for our work, which measurements mean include access to code to measure and includes inspiration from the use of corpora in applied the tools to do the measurement. The advent of open source linguistics and the limited empirical studies of code that have software (OSS) has meant significantly more code is now been performed. We also discuss the use of reference collec- accessible for measurement than in the past. This has led to tions in other areas of software engineering and in computer an increase in interest in empirical studies of code. However, science, and discuss the need for a curated collection of 1530-1362/10 $26.00 © 2010 IEEE 336 DOI 10.1109/APSEC.2010.46 code. In section III we discuss the challenges faced when Open source software has existed for several decades, doing empirical studies of code, and from that, determine with systems such as Unix, emacs, and TEX. Their use in the requirements of a curated corpus. Section IV presents empirical studies is relatively recent. For example, Miller et the details of the Qualitas Corpus, its current organisation, al. [8] studied about 90 Unix applications (including emacs, immediate future plans, and rationale of the decisions we TEX, LATEX, yacc) to determine how they responded to input. have taken. Section V evaluates the Qualitas Corpus. Finally Frakes and Pole [9] used Unix tools as the basis for a study we present our conclusions in section VI. on methods for searching for reusable components. During the 1990s the number of accessible systems in- II. MOTIVATION AND RELATED WORK creased, particularly those written in C++, and consequently the number of studies increased. Chidamber and Kemerer The use of a standard collection of artifacts to support applied their metrics to two systems, one had 634 C++ study in an area is not new, neither in general nor in software classes, the other had 1459 Smalltalk classes [1]. No further engineering. One area is that of applied linguistics, where information on the systems was given. standard corpora are the basis for much of the research being Bieman and Zhao studied inheritance in 19 C++ systems, done. Hunston [2] opens her book with “It is no exagger- ranging from 7 classes to 922 classes in size, with 2744 ation to say that corpora, and the study of corpora, have classes in total [10]. They identified the systems studied, revolutionised the study of language, and of the applications but did not identify the versions for all systems. of language, over the last few decades.” Ironically, it is the Harrison et al. applied two coupling metrics to five availability of software systems support for language corpora collections of C++ code, consisting of 96, 197, 113, 61, that has enabled this form of research, whereas researchers and 12 classes respectively [11]. They identified the systems examining code artifacts have been slow to adopt this idea. involved but not the versions studied. While the goals of applied linguistics research is not exactly Chidamber et al. studied three systems, one with 45 the same as ours, the similarities are close enough to warrant C++ classes, one with 27 Objective C classes, and one examining how corpora are used in that field. Their use of identifying 25 classes in design documents [12]. They were corpora is a major motivation for the Qualitas Corpus. We required to restrict information about the systems studied for will discuss language corpora in more detail in section III. commercial reasons. By the end of the millennium, repositories supporting A. Empirical studies of Code open source development such as sourceforge, as well To answer the question of whether a code corpus is as the increase in effectiveness of Internet search systems, necessary, we sample past empirical studies of code. By meant a large number of systems were accessible. This “empirical study of code” we mean a study in which the affected both the number of studies done, and often their artifacts under investigation consist of source code, there size. A representative set of examples include one with 3 are multiple, unrelated, artifacts, and the artifacts were fairly large Java systems [13], a study of 14 Java systems developed independently of the study. This rules out, for [14], and a study of 35 systems, from several languages example, studies that included the creation of the code including Java, C++, Self, and Smalltalk [15]. artifacts, such as those by Briand et al. [3] or Lewis et al. Two particularly large studies were by Succi et al. [16] [4], and studies of one system, such as that by Barry [5]. and Collberg et al [17]. Succi et al. studied 100 Java and 100 Empirical studies of code have been performed for at least C++ applications. The Java applications ranged from 28 to four decades. As with many other things, Knuth was one of 936 classes in size (median 83.5) and the C++ applications the first to carry out empirical studies to understand what ranged from 30 to 2520 classes (median 59). The actual code that is actually written looks like [6]. He presented a applications were not identified. Collberg et al. analysed static analysis of over 400 FORTRAN programs, totalling 1132 Java jar files collected from the Internet. According about 250,000 cards, and dynamic analysis of about 25 to their statistics they analyse a total of 102,688 classes programs. He chose programs that could “run to completion” and 12,188 interfaces. No information was given as to what from job submissions to Stanford’s Computation Center, applications were analysed. various subroutine libraries and scientific packages, contri- The studies described above suggest that there is interest butions from IBM, and personal programs. His main moti- in doing studies that involve analysing code and the ability vation was compiler design, with the concern that compilers to do such studies has significantly advanced our knowledge may not optimise for the typical case as no-one knew what about the characteristics of code structure.
Recommended publications
  • Comodo System Cleaner Version 3.0
    Comodo System Cleaner Version 3.0 User Guide Version 3.0.122010 Versi Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Comodo System Cleaner - User Guide Table of Contents 1.Comodo System-Cleaner - Introduction ............................................................................................................ 3 1.1.System Requirements...........................................................................................................................................5 1.2.Installing Comodo System-Cleaner........................................................................................................................5 1.3.Starting Comodo System-Cleaner..........................................................................................................................9 1.4.The Main Interface...............................................................................................................................................9 1.5.The Summary Area.............................................................................................................................................11 1.6.Understanding Profiles.......................................................................................................................................12 2.Registry Cleaner............................................................................................................................................. 15 2.1.Clean.................................................................................................................................................................16
    [Show full text]
  • Cuteftp Pro V8 Utorrent
    1 / 2 CuteFTP Pro V8 Utorrent 2.1 Server ... FileZilla FTP Client, WS FTP, Bullet Proof FTP, CuteFTP ... Vuze (formerly Azureus), utorrent, Transmission, Deluge, qBittorrent, .... Nero 8 Ultra Edition 8 3 13 0 crack. Utorrent 1.8.3 serial keygen. Globalscape Cuteftp Pro 8 3 3 054 key code generator. Betterzip 1.8.3 crack.. CuteFTP Pro V8 Utorrent cuteftp, cuteftp free, cuteftp mac, cuteftp server, cuteftp vs filezilla, cuteftp sftp, cuteftp portable, cuteftp crack, cuteftp 8 professional, .... Download CCProxy 8 is easy-to-use and powerful. ... allows use of ICQ, MSN Messenger, Yahoo Messenger, CuteFTP, CuteFTP Pro and WS-FTP. ... Previous uTorrent Pro Crack 3.5.4 Build 44590 & Key Free Download.. Find SophosLabs data about viruses, spyware, suspicious behavior and files, adware, PUAs, and controlled applications and devices. · ABC · ABC Client · ANts P2P .... FCleaner 1.3.1.621Jul 12th; Registry Gear 2.1.1.609Jun 9th; CuteFTP Pro 8.3.4Jun 2nd; CuteFTP Lite 8.3.4Jun 2nd ... [Show All]8 softwares in this category. 8 September 2012 at 16:11 Reply ... [SOFTWARE] uTorrent Turbo Booster · [GAMES] JUST CAUSE 2 SKIDROW + DLC LIMITED CONTENT · [OS] ... [CUSTOM] AlienWare Full Pack · [SOFTWARE] CuteFTP / Cute FTP Professional v8.3.3.. Cakewalk Dimension Pro DXi and VSTi sampler synthesizer works great with ... FXsound DFX Audio Enhancement v8.0 for Windows Media Player & Winamp ... GlobalSCAPE CuteFTP 4.2; GlobalSCAPE CuteFTP 8, 8.0.4 Pro (Error ... Beta (Chinese Simplified/Traditional); uTorrent 1.6; WinMX 3.54 (Beta 4).. Able2Extract Professional v8.0.28.0 Incl Crack [TorDigger] utorrent · SpyKey.rar Serial Key keygen · PATCHED Win 10 Pro RS3 En-us (x86 x64) ...
    [Show full text]
  • Complaint of ) ) Free Press and Public Knowledge ) ) __- ______Against Comcast Corporation ) ) for Secretly Degrading Peer-To-Peer Applications ) ) To: Ms
    Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 20554 Formal Complaint of ) ) Free Press and Public Knowledge ) ) __- _______ Against Comcast Corporation ) ) For Secretly Degrading Peer-to-Peer Applications ) ) To: Ms. Marlene H. Dortch, Secretary, FCC ) Formal Complaint Marvin Ammori, General Counsel Andy Schwartzman Ben Scott, Policy Director Harold Feld Free Press Parul Desdai 501 Third Street NW, Suite 875 Media Access Project Washington, DC 20001 1625 K Street, NW 202-265-1490 Suite 1000 Washington, DC 20006 (202) 232-4300 November 1, 2007 Table of Contents Summary ..................................................................................................................................i I. Facts ........................................................................................................................1 A. Parties..................................................................................................................1 B. Network Neutrality Background...........................................................................2 C. Comcast Blocks Innovative Applications .............................................................5 D. Comcast’s Methods are Deliberately Secretive.....................................................9 II. Legal Argument .....................................................................................................12 A. Degrading Applications Violates the Commission’s Internet Policy Statement, Which the FCC Has Vowed to Enforce..............................................................12
    [Show full text]
  • Special Characters A
    453 Index ■ ~/Library/Safari/WebpageIcons.db file, Special Characters 112 $(pwd) command, 89–90 ~/Library/Saved Searches directory, 105 $PWD variable, 90 ~/Library/Services directory, 422–423 % (Execute As AppleScript) menu option, ~/Library/Workflow/Applications/Folder 379 Actions folder, 424 ~/ directory, 6, 231 ~/Library/Workflows/Applications/Image ~/bin directory, 6, 64, 291 Capture folder, 426 ~/Documents directory, 281, 290 ~/Movies directory, 323, 348 ~/Documents/Knox directory, 255 ~/Music directory, 108, 323 ~/Downloads option, 221, 225 ~/Music/Automatically Add To iTunes ~/Downloads/Convert For iPhone folder, folder, 424 423–424 ~/Pictures directory, 281 ~/Downloads/MacUpdate ~/.s3conf directory, 291 Desktop/MacUpdate Desktop ~/ted directory, 231 2010-02-20 directory, 16 ~/Templates directory, 60 ~/Downloads/To Read folder, 425 ~/Templates folder, 62 ~/Dropbox directory, 278–282 Torrent program, 236 ~/Library folder, 28 1Password, 31, 135, 239–250 ~/Library/Application 1Password extension button, 247–248 Support/Evom/ffmpeg directory, 1Password.agilekeychain file, 249 338 1PasswordAnywhere tool, 249 ~/Library/Application 1Password.html file, 250 Support/Fluid/SSB/[Your 2D Black option, 52 SSB]/Userstyles/ directory, 190 2D With Transparency Effect option, 52 ~/Library/Application Support/TypeIt4Me/ 2-dimensional, Dock, 52 directory, 376 7digital Music Store extension, 332 ~/Library/Caches/com.apple.Safari/Webp age Previews directory, 115 ~/Library/Internet Plug-Ins directory, 137 ■A ~/Library/LaunchAgents directory, 429, 432
    [Show full text]
  • Stellar Bitraser File Eraser(2 MB, PDF)
    BITRASER FILE ERASER Wipe Files Beyond Recovery Secure File Erasure Software For Safeguarding Privacy BitRaser File Eraser DIY software for permanent wiping of sensitive files, web browsing history, app & system traces, & deleted files from laptop, desktops, and external storage media. Wipe sensitive files across devices. Ensure data safety! BitRaser File Eraser is a simple & powerful software for safeguarding data through secure wiping of sensitive files on Windows systems. The tool is ideal for anyone who uses a computer and wants to secure themselves from data breach or leakage threats. Erase files & folders Wipe identity Erase web browsing from Windows PC and documents, tax records, history from Chrome, external storage, etc. photos & videos, etc. Mozilla, Safari, etc. Available for: Know more © Copyright Stellar Information Technology Pvt. Ltd. All Trademarks Acknowledged. www.stellarinfo.com BITRASER FILE ERASER WIPES ALL TYPES OF SENSITIVE FILES ERASES ALL DEVICES & DRIVES Erases photos, videos, tax records, social security Wipes Windows PC, USB flash drives, external number, credit card statement, personal health HDD, SD Card & even files stored on servers. records, official documents and more. CLEARS WEB BROWSING HISTORY REMOVES APPLICATION TRACES TRACES Erases browsing history, cookies, temporary files, Removes activity logs, preferences, etc. generated favorites, etc. Supports Chrome, Mozilla, Safari, IE, with use of News apps, Instant Messengers, Email Microsoft Edge, Opera, & SeaMonkey. apps, Peer to Peer apps, & more. ERASES THE DELETED FILES SCHEDULES THE ERASURE TASKS Wipes the deleted files from system by erasing the Allows to preset & run wiping tasks based on time, day unused space freed up after deletion. Secures & frequency. You can choose specific files for wiping against retrieval of sensitive deleted files.
    [Show full text]
  • Multiresolution Recurrent Neural Networks: an Application to Dialogue Response Generation
    Multiresolution Recurrent Neural Networks: An Application to Dialogue Response Generation Iulian Vlad Serban∗◦ Tim Klinger University of Montreal IBM Research 2920 chemin de la Tour, T. J. Watson Research Center, Montréal, QC, Canada Yorktown Heights, NY, USA Gerald Tesauro Kartik Talamadupula Bowen Zhou IBM Research IBM Research IBM Research T. J. Watson Research Center, T. J. Watson Research Center, T. J. Watson Research Center, Yorktown Heights, Yorktown Heights, Yorktown Heights, NY, USA NY, USA NY, USA Yoshua Bengioy◦ Aaron Courville◦ University of Montreal University of Montreal 2920 chemin de la Tour, 2920 chemin de la Tour, Montréal, QC, Canada Montréal, QC, Canada Abstract We introduce the multiresolution recurrent neural network, which extends the sequence-to-sequence framework to model natural language generation as two parallel discrete stochastic processes: a sequence of high-level coarse tokens, and a sequence of natural language tokens. There are many ways to estimate or learn the high-level coarse tokens, but we argue that a simple extraction procedure is sufficient to capture a wealth of high-level discourse semantics. Such procedure allows training the multiresolution recurrent neural network by maximizing the exact joint log-likelihood over both sequences. In contrast to the standard log- likelihood objective w.r.t. natural language tokens (word perplexity), optimizing the joint log-likelihood biases the model towards modeling high-level abstractions. We apply the proposed model to the task of dialogue response generation in arXiv:1606.00776v2 [cs.CL] 14 Jun 2016 two challenging domains: the Ubuntu technical support domain, and Twitter conversations. On Ubuntu, the model outperforms competing approaches by a substantial margin, achieving state-of-the-art results according to both automatic evaluation metrics and a human evaluation study.
    [Show full text]
  • Article 119 6465 Pdf 100.Pdf
    The European Proceedings of Social & Behavioural Sciences EpSBS ISSN: 2357-1330 https://doi.org/10.15405/epsbs.2019.09.02.13 EEIA 2019 International Conference "Education Environment for the Information Age" FORMATION OF PROFESSIONAL COMPETENCES BY MODERN INFORMATIZATION Tatiana A. Averianova (a)*, Galina A. Kasatova (b), Bella L. Kagan-Rozentsveig (c) *Corresponding author (a) Nosov Magnitogorsk State Technical University. Address: 455000, Magnitogorsk, Lenin Avenue, 38. E-mail: [email protected]* (b) Nosov Magnitogorsk State Technical University. Address: 455000, Magnitogorsk, Lenin Avenue, 38. E-mail: [email protected] (c) Nosov Magnitogorsk State Technical University. Address: 455000, Magnitogorsk, Lenin Avenue, 38. E-mail: [email protected] Abstract The aim of this study is to present the process of forming the professional competence of bachelors in the field of “Technology of artistic processing of materials” in the system “study group – college – university” by informatization. In accordance with this purpose, the following tasks were accomplished: we have analyzed the existing problems; the educational system “study group – college – university” was created; and also we have implemented a system of professional selection. The methodology of forming professional competencies by informatization was introduced at all stages of the given system. The following methods are used: analysis, modeling, and actualization. Modern scientists repeatedly outlined the importance of the questions about the need for continuous improvement in the field of information technologies for the purpose of targeting, selecting and implementing funds in the professional field, expanding the information base for providing educational institutions, and the need for the teaching staff mobility in advancing their educational level in the field of information and communication technologies.
    [Show full text]
  • Firefox Won't Download Torrents on Vuze Firefox Won't Download Torrents on Vuze
    firefox won't download torrents on vuze Firefox won't download torrents on vuze. Completing the CAPTCHA proves you are a human and gives you temporary access to the web property. What can I do to prevent this in the future? If you are on a personal connection, like at home, you can run an anti-virus scan on your device to make sure it is not infected with malware. If you are at an office or shared network, you can ask the network administrator to run a scan across the network looking for misconfigured or infected devices. Another way to prevent getting this page in the future is to use Privacy Pass. You may need to download version 2.0 now from the Chrome Web Store. Cloudflare Ray ID: 67af8650d8ef1667 • Your IP : 188.246.226.140 • Performance & security by Cloudflare. Firefox won't download torrents on vuze. Avoid support scams. We will never ask you to call or text a phone number or share personal information. Please report suspicious activity using the “Report Abuse” option. why can't i download firefox? 2 replies 9 have this problem 4030 views Last reply by James. i have been trying to download fire fox and it just keeps saying it is downloading! how long does it take? Chosen solution. Downloading Firefox should take less than 5 minutes depending on your internet plan. May I ask, what browser are you using to download Firefox? All Replies (2) Chosen Solution. Downloading Firefox should take less than 5 minutes depending on your internet plan. May I ask, what browser are you using to download Firefox? Moderator.
    [Show full text]
  • Web Services' Integration Into a Peer-To-Peer Bittorrent Client
    FACULDADE DE ENGENHARIA DA UNIVERSIDADE DO PORTO Web Services’ Integration into a Peer-to-Peer BitTorrent Client Francisco A. Barbosa Thesis submitted for the degree of Master in Electrical and Computers Engineering Major in Telecommunications Supervisor: Maria Teresa Andrade (Ph.D.) Supervisor: Asdrúbal Costa (Ing.) March, 2009 Resumo Actualmente, quando se fala em computação distribuída e disseminação rápida de dados, a primeira tecnologia em que se pensa é em sistemas peer-to-peer. Este método alternativo de co- municação, por oposição à tradicional arquitectura cliente-servidor, permite que, numa rede, todos os nós comuniquem simultaneamente entre si, aumentando a rapidez e a eficiência das transmis- sões de dados. Tomando em consideração este facto, não é pois de estranhar que esta seja a tecnologia adoptada no âmbito do projecto europeu MOSAICA, um projecto que pretende fornecer uma plataforma para que conteúdos multimédia de diversas culturas, etnias e religiões possam ser disseminados por todo o mundo, numa tentativa de promover a igualdade e tolerância entre povos e combater as diferenças culturais através do conhecimento das mesmas. Esta dissertação pretende não só analisar as tecnologias inerentes à rede MOSAICA, como também contribuir com ferramentas que tornem este projecto mais próximo do seu objectivo: fazer com que os conteúdos que circulam na rede MOSAICA cheguem a qualquer lado e que possam ser acedidos a partir de qualquer lado, com a máxima simplicidade possível. Em particular, o objectivo desta tese é o de especificar e desenvolver uma aplicação Web e respectivos módulos de suporte, tornando possível a interacção com um cliente BitTorrent, permitindo a qualquer utilizador com ligação Internet e um browser Web usufruir das mesmas vantagens que um utilizador de redes peer-to-peer, podendo aceder aos conteúdos distribuídos nessa rede, com hipótese de transferir os mesmos para o seu computador, sem necessidade de estar associado à rede peer-to-peer e, consequentemente, sem necessidade de instalar qualquer tipo de software peer-to-peer.
    [Show full text]
  • DVD-Ofimática 2014-07
    (continuación 2) Calizo 0.2.5 - CamStudio 2.7.316 - CamStudio Codec 1.5 - CDex 1.70 - CDisplayEx 1.9.09 - cdrTools FrontEnd 1.5.2 - Classic Shell 3.6.8 - Clavier+ 10.6.7 - Clementine 1.2.1 - Cobian Backup 8.4.0.202 - Comical 0.8 - ComiX 0.2.1.24 - CoolReader 3.0.56.42 - CubicExplorer 0.95.1 - Daphne 2.03 - Data Crow 3.12.5 - DejaVu Fonts 2.34 - DeltaCopy 1.4 - DVD-Ofimática Deluge 1.3.6 - DeSmuME 0.9.10 - Dia 0.97.2.2 - Diashapes 0.2.2 - digiKam 4.1.0 - Disk Imager 1.4 - DiskCryptor 1.1.836 - Ditto 3.19.24.0 - DjVuLibre 3.5.25.4 - DocFetcher 1.1.11 - DoISO 2.0.0.6 - DOSBox 0.74 - DosZip Commander 3.21 - Double Commander 0.5.10 beta - DrawPile 2014-07 0.9.1 - DVD Flick 1.3.0.7 - DVDStyler 2.7.2 - Eagle Mode 0.85.0 - EasyTAG 2.2.3 - Ekiga 4.0.1 2013.08.20 - Electric Sheep 2.7.b35 - eLibrary 2.5.13 - emesene 2.12.9 2012.09.13 - eMule 0.50.a - Eraser 6.0.10 - eSpeak 1.48.04 - Eudora OSE 1.0 - eViacam 1.7.2 - Exodus 0.10.0.0 - Explore2fs 1.08 beta9 - Ext2Fsd 0.52 - FBReader 0.12.10 - ffDiaporama 2.1 - FileBot 4.1 - FileVerifier++ 0.6.3 DVD-Ofimática es una recopilación de programas libres para Windows - FileZilla 3.8.1 - Firefox 30.0 - FLAC 1.2.1.b - FocusWriter 1.5.1 - Folder Size 2.6 - fre:ac 1.0.21.a dirigidos a la ofimática en general (ofimática, sonido, gráficos y vídeo, - Free Download Manager 3.9.4.1472 - Free Manga Downloader 0.8.2.325 - Free1x2 0.70.2 - Internet y utilidades).
    [Show full text]
  • Integrating Quality Models and Static Analysis for Comprehensive Quality Assessment
    Integrating Quality Models and Static Analysis for Comprehensive Quality Assessment Klaus Lochmann Lars Heinemann Technische Universität München, Garching b. München, Germany {lochmann,heineman}@in.tum.de ABSTRACT (1) Code analysis tools provide a large range of metrics To assess the quality of software, two ingredients are avail- that can be used as indicators for the quality of a software able today: (1) quality models defining abstract quality product. However, these metrics focus on very special as- characteristics and (2) code analysis tools providing a large pects of the source code and it is therefore difficult to use variety of metrics. However, there exists a gap between these them for obtaining a comprehensive overview of the overall two worlds. The quality attributes defined in quality models quality of a software system. are too abstract to be operationalized. On the other side, (2) Quality models like ISO 25010 [2] and others [3, 7, the aggregation of the results of static code analysis tools re- 6] define high-level quality attributes, which are commonly mains a challenge. We address these problems by defining a used to characterize the quality of software. However, these quality model based on an explicit meta-model. It allows to quality models are too abstract to be operationalized for the operationalize quality models by defining how metrics cal- quality assessment of a software system. culated by tools are aggregated. Furthermore, we propose a Problem. There exists a gap between abstract quality new approach for normalizing the results of rule-based code characteristics defined in quality models on the one hand analysis tools, which uses the information on the structure and isolated quality analysis tools on the other hand.
    [Show full text]
  • Impact of License Selection on Open Source Software Quality Benjamin J
    Purdue University Purdue e-Pubs Open Access Theses Theses and Dissertations Fall 2014 Impact of license selection on open source software quality Benjamin J. Cotton Purdue University Follow this and additional works at: https://docs.lib.purdue.edu/open_access_theses Part of the Computer Engineering Commons, and the Computer Sciences Commons Recommended Citation Cotton, Benjamin J., "Impact of license selection on open source software quality" (2014). Open Access Theses. 314. https://docs.lib.purdue.edu/open_access_theses/314 This document has been made available through Purdue e-Pubs, a service of the Purdue University Libraries. Please contact [email protected] for additional information. PURDUE UNIVERSITY GRADUATE SCHOOL Thesis/Dissertation Acceptance Benjamin James Cotton ! ! Impact of license selection on open source software quality Master of Science Kevin Dittman Jeffrey Brewer Jeffrey Whitten To the best of my knowledge and as understood by the student in the Thesis/Dissertation Agreement, Publication Delay, and Certification/Disclaimer (Graduate School Form 32), this thesis/dissertation adheres to the provisions of Purdue University’s “Policy on Integrity in Research” and the use of copyrighted material. Kevin Dittman Jeffrey Whitten 11/24/2014 IMPACT OF LICENSE SELECTION ON OPEN SOURCE SOFTWARE QUALITY AThesis Submitted to the Faculty of Purdue University by Benjamin J. Cotton In Partial Fulfillment of the Requirements for the Degree of Master of Science December 2014 Purdue University West Lafayette, Indiana ii Dedicated to my wife, Angela, and my daughters, Eleanor and Bridget, whose unconditional love and support made this possible. iii ACKNOWLEDGMENTS No thesis is ever completed without support, advice, and encouragement. I would like to thank the following people for their contributions to my e↵orts.
    [Show full text]