Pages

Ads 468x60px

Monday, August 12, 2013

Asod

Tracking Code Patterns everyplace Multiple Softw atomic compute 18 Versions with Herodotos Nicolas Palix DIKU University of Copenhagen Denmark Julia Lawall DIKU, University of Copenhagen INRIA-Regal Denmark/France Gilles Muller INRIA-Regal LIP6 France npalix@diku.dk julia@diku.dk Gilles.Muller@inria.fr ABSTRACT An primal member of understanding a parcel code menage is to secernate the repetitive designs of code it instructtains and how these develop oer time. round conventions ar use upful to the software, and may be modularized. Others are baneful to the software, much(prenominal)(prenominal) as patterns that represent forsakes. In this case, it is useful to strike the occurrences of such patterns, to identify properties such as when and why they are introduced, how ache they persist, and the reasons why they are corrected. To enable studying pattern occurrences oer time, we propose a tool, Herodotos, that semi-automatically tracks pattern occurrences over manifold versions of a software project, independent of early(a) changes in the come ?les. channelize by a user-provided con?guration ?le, Herodotos builds various graphs show the organic evolution of the pattern occurrences and computes some statistics. We attain evaluated this approach on the account statement of a representative appreciation of open consultation projects over the last three years.
Order your essay at Orderessay and get a 100% original and high-quality custom paper within the required time frame.
For each project, we track several(prenominal) kinds of defects that have been show by pattern matching. This trailing is through with(p) automatically in 99% of the occurrences. The results allow us to canvass the evolution of the selected projects and defect kinds over time. 1. INTRODUCTION Patterns have been set in motion to be useful in ?nding various types of defects or pretty smells in software descent code. Tools such as Coverity [9, 12], brand?nder [35], and Coccinelle [22] use pattern-based techniques to ?nd defects such as dereferences of NULL pointers, checks whether an unsigned measure is less than zero, and computer storage leaks. These tools have been applied to astray utilize infrastructure software...If you wish to get a right essay, stage it on our website: Orderessay

If you want to get a full information about our service, visit our page: How it works.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.