1St Workshop on Refactoring Tools (WRT'07)

1St Workshop on Refactoring Tools (WRT'07)

Forschungsberichte der Fakultät IV – Elektrotechnik und Informatik 1st Workshop on Refactoring Tools (WRT'07) Proceedings July 31, 2007, TU Berlin, Germany Danny Dig, Michael Cebulla (Eds.) Bericht-Nr. 2007 – 8 ISSN 1436-9915 Table of Contents WRT’07 Organization …………………………………………………….v Proceedings …………………………………………………………………. • KABA: Automated Refactoring for Improved Cohesion ……………………..1 G. Snelting, M. Streckenbach (Universitat Passau) • Automation of Refactoring and Refactoring Suggestions for TTCN-3 Test Suites. The TRex TTCN-3 Refactoring and Metrics Tool ……………..…………3 H. Neukirchen, B. Zeiss (University of Gottingen) • A visual interface for type-related refactorings ……………………………….5 P. Mayer (Ludwig-Maximilians-Universität), A. Meißner (Fernuniversität in Hagen), F. Steimann (Fernuniversität in Hagen) • ITCORE: A Type Inference Package for Refactoring Tools …………………7 H. Kegel (ej-technologies GmbH), F. Steimann (Fernuniversität in Hagen) • Flexible Transformation Language …………………………………………….9 A. A. Santos, L. Menezes, and M. Cornélio (UPE) • A Refactoring Discovering Tool based on Graph Transformation …………11 J. Perez, Y. Crespo (Universidad de Valladolid) • Refactoring with Contracts ……………………………………………………13 Y. A. Feldman, M. Goldstein (IBM Haifa Research Lab), S. Tyszberowicz (The Academic College of Tel-Aviv Yaffo) • Synchronizing Refactored UML Class Diagrams and OCL Constraints ……………………………………………………………...15 S. Markovic, T. Baar (Ecole Polytechnique Federale de Lausanne) • Code Analyses for Refactoring by Source Code Patterns and Logical Queries ……………………………………………………...17 D. Speicher, M. Appeltauer, G. Kniesel (University of Bonn) • Reuse Based Refactoring Tools ………………………………………………..21 R. Marticorena, C. Lopez (University of Burgos), Y. Crespo, J. Perez (University of Valladolid) i • SORMASA: A tool for Suggesting Model Refactoring Actions by Metrics-led Genetic Algorithm ………………………………………….……..23 T. Bodhuin, G. Canfora, L. Troiano (University of Sannio) • Model-driven Software Refactoring …………………………………………..25 T. Mens (Université de Mons-Hainaut),G. Taentzer (Philipps-Universität Marburg) • The “Extract Refactoring” Refactoring ………………………………………29 R. Robbes, M. Lanza (University of Lugano) • Advanced Refactoring in the Eclipse JDT: Past, Present, and Future ………………………………………………………….31 R. M. Fuhrer (IBM Research), M. Keller (IBM Zurich), A. Kieżun (MIT) • Product Line Variability Refactoring Tool ………………………………..…33 F. Calheiros, V. Nepomuceno (Meantime Mobile Creations), P. Borba , S. Soares (UPFE), V. Alves (Lancaster University) • AJaTS: AspectJ Transformation System …………………………………….35 R. Arcoverde, S. Soares, P. Lustosa, P. Borba (UFPE) • Towards a Change Specification Language for API Evolution ……………..37 J. Reuter, F. Padberg (Universitat Karlsruhe) • Holistic Semi-Automated Software Refactoring ……………………………..39 E. Mealy (University of Queensland) • Engineering Usability for Software Refactoring Tools ……………………...41 E. Mealy (University of Queensland) • Automated Testing of Eclipse and NetBeans Refactoring Tools ……………43 B. Daniel, D. Dig, K. Garcia, D. Marinov (University of Illinois at Urbana-Champaign) • Refactoring in Erlang, a Dynamic Functional Language ……………...……45 L. Lovei, Z. Horvath, T. Kozsik, R. Kiraly, A. Vıg, T. Nagy (Eotvos Lorand University) • Operation-based Merging of Development Histories ………………………..47 T. Freese (University of Oldenburg) • Improving Method Extraction: A Novel Approach to Data Flow Analysis Using Boolean Flags and Expressions ………………………………….49 N. Juillerat, B. Hirsbrunner (University of Fribourg) ii • Refactoring-Based Support for Binary Compatibility in Evolving Frameworks ……………………………………………………………...51 I. Savga, M. Rudolf (Technische Universitat Dresden) • The LAN-simulation: A Refactoring Lab Session ………………………....5…3 S. Demeyer, B. Du Bois, M. Rieger, B. Van Rompaey (University Of Antwerp) • A Heuristic-Based Approach to Code-Smell Detection ……………………...55 D. Kirk, M. Roper, M. Wood (University of Strathclyde) • Using Java 6 Compiler as a Refactoring and an Analysis Engine …………..57 J. Bečička, P. Zajac, P. Hřebejk (Sun Microsystems, Inc.) • Making Programmers Aware Of Refactorings ………………………………59 P. Weißgerber, B. Biegel, S. Diehl (University of Trier) • Why Don’t People Use Refactoring Tools? ………………………………. …..61 E. Murphy-Hill, A. P. Black (Portland State University) • Automating Feature-Oriented Refactoring of Legacy Applications ……..…63 C. Kastner, M. Kuhlemann (University of Magdeburg), D. Batory (University of Texas at Austin) • An Adaptation Browser for MOF ………………………………………… .….65 G. Wachsmuth (Universitat zu Berlin) • Refactoring Functional Programs at the University of Kent ……………..…67 S. Thompson, C. Brown, H. Li, C. Reinke, N. Sultana (University of Kent) iii 1st Workshop on Refactoring Tools (WRT’07) Organization Chair and Organizer: Danny Dig (University of Illinois at Urbana-Champaign) Program Committee: Jan Becicka (NetBeans Refactoring Engine, Sun Microsystems) Danny Dig (University of Illinois at Urbana-Champaign) William G. Griswold (University of California, San Diego) Ralph Johnson (University of Illinois at Urbana-Champaign) Markus Keller (Eclipse Refactoring Engine, IBM) Oege de Moor (Oxford University Computing Laboratory) Frank Tip (IBM T.J. Watson Research Center) v 1st Workshop on Refactoring Tools (WRT'07) KABA: Automated Refactoring for Improved Cohesion G. Snelting, M. Streckenbach Universitat¨ Passau class A { 1Overview int x, y, z; void f() { class Client { Cohesion is one of the most important software en- y=x; public static void } gineering principles. Cohesion demands in partic- main(String[] args) { } ular that data and function operating on these data A a1 = new A(); // A1 A a2 = new A(); // A2 are defined together in one class definition. But not class B extends A { B b1 = new B(); // B1 void f() { all existing Java class hierarchies define a cohesive B b2 = new B(); // B2 software architecture. y++; } a1.x = 17; KABA analyses a class hierarchy together with void g() { a2.x = 42; a set of client programs. It refactors the hierarchy x++; if (...) { a2 = b2; } f(); such that data members (fields) and methods oper- a2.f(); } ating on the data are always grouped together, and b1.g(); void h() { b2.h(); that any class in the refactored hierarchy contains f(); } only fields and methods which are indeed needed by x--; } some client code using the class. Every class-typed } variable is given a new type (namely a class from } the refactored hierarchy), while the program state- ments remain essentially unchanged. In contrast to some other refactoring tools, KABA guarantees that program behaviour is unchanged after refactoring. KABA is based on fine-grained (static or dy- namic) program analysis, namely points-to analysis, type constraints, and mathematical concept lattices. Typically, an original class is split if different clients use different subsets of a class’s functionality. In order to avoid too fine-grained refactorings, the ini- Figure 1: A small program and its KABA refactor- tial refactoring is usually simplified by automatic or ing manual semantics-preserving transformations. Thus KABA provides fine-grained insight into the true usage patterns of classes in a program, can serve B1 calls g() while B2 calls h(), hence two to evaluate cohesion of existing systems, and will new subclasses for B are introduced. automatically generate semantics-preserving refac- The new subclasses give fine-grained insight into torings which improve cohesion. KABA is imple- what objects really do, and maximise cohesion as mented in form of a refactoring browser. in the new hierarchy members are grouped together iff they are used together. A nice by-product is that 2 Examples and Experiences objects are minimized and dead members are elim- inated. But since the refactored hierarchy may be KABA reacts to usage patterns of a class by client quite fine-grained, the engineer may remerge classes code. In figure 1, client objects A1, A2, B1, B2 (eg the two top classes in figure 1). In any case, access different subsets of class A and B: KABA guarantees preservation of semantics. For the complex technical details, see [1]. object A1 accesses only x from class A, while The resulting refactored hierarchy, as well as A2 also accesses f() and thus y; therefore cross references between new and old classes, as class A is split into two subclasses displayed by the KABA refactoring browser, are 1 1st Workshop on Refactoring Tools (WRT'07) ...RuleBlock ...TreeElement ...OneOrMoreBlock ...AlternativeBlock ...BlockWithImpliedExitPath ...ZeroOrMoreBlock ...RuleRefElement ...SynPredBlock ...BlockEndElement ...RuleEndElement Object ...GrammarElement ...AlternativeElement ...ActionElement ...TokenRefElement ...GrammarAtom ...CharLiteralElement ...CharRangeElement ...StringLiteralElement ...TokenRangeElement ...WildcardElement 5 ...GrammarElement 1 4 ...BlockEndElement 14 ...RuleEndElement 2 2 13 ...ZeroOrMoreBlock Figure 2: KABA screenshot for figure 1 1 12 ...BlockWithImpliedExitPath 11 ...AlternativeBlock 17 ...OneOrMoreBlock 1 ...AlternativeBlock 2 ...RuleRefElement 19 3 ...SynPredBlock 1 16 ...ActionElement 1 1 10 ...AlternativeBlock ...AlternativeBlock ...AlternativeBlock 3 ...AlternativeElement 20 21 ...RuleBlock 1 ...RuleBlock 1 ...GrammarElement 22 ...CharRangeElement Object 1 ...AlternativeElement 1 ...AlternativeBlock ...AlternativeElement 6 7 ...AlternativeBlock ...AlternativeBlock 2 24 ...TreeElement 1 ...GrammarAtom 9 ...TokenRefElement 1 8 ...GrammarAtom 15 ...WildcardElement 1 18 ...StringLiteralElement

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    76 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us