S. Breu, T. Zimmermann, и C. Lindig. International workshop on Mining software repositories, стр. 94--97. Shanghai, China, ACM, (2006)
Аннотация
Software may contain functionality that does not align with its architecture. Such cross-cutting concerns do not exist from the beginning but emerge over time. By analysing where developers add code to a program, our history-based mining identifies cross-cutting concerns in a two-step process. First, we mine CVS archives for sets of methods where a call to a specific single method was added. In a second step, such simple cross-cutting concerns are combined to complex cross-cutting concerns. To compute these efficiently, we apply formal concept analysis---an algebraic theory. History-based mining scales well: we are the first to report aspects mined from an industrial-sized project like ECLIPSE. For example, we identified a locking concern that crosscuts 1284 methods.
%0 Conference Paper
%1 breu06msr
%A Breu, Silvia
%A Zimmermann, Thomas
%A Lindig, Christian
%B International workshop on Mining software repositories
%C Shanghai, China
%D 2006
%I ACM
%K evolution msr
%P 94--97
%T Mining eclipse for cross-cutting concerns
%U http://portal.acm.org/citation.cfm?id=1138006
%X Software may contain functionality that does not align with its architecture. Such cross-cutting concerns do not exist from the beginning but emerge over time. By analysing where developers add code to a program, our history-based mining identifies cross-cutting concerns in a two-step process. First, we mine CVS archives for sets of methods where a call to a specific single method was added. In a second step, such simple cross-cutting concerns are combined to complex cross-cutting concerns. To compute these efficiently, we apply formal concept analysis---an algebraic theory. History-based mining scales well: we are the first to report aspects mined from an industrial-sized project like ECLIPSE. For example, we identified a locking concern that crosscuts 1284 methods.
@inproceedings{breu06msr,
abstract = {Software may contain functionality that does not align with its architecture. Such cross-cutting concerns do not exist from the beginning but emerge over time. By analysing where developers add code to a program, our history-based mining identifies cross-cutting concerns in a two-step process. First, we mine CVS archives for sets of methods where a call to a specific single method was added. In a second step, such simple cross-cutting concerns are combined to complex cross-cutting concerns. To compute these efficiently, we apply formal concept analysis---an algebraic theory. History-based mining scales well: we are the first to report aspects mined from an industrial-sized project like ECLIPSE. For example, we identified a locking concern that crosscuts 1284 methods.},
added-at = {2009-03-06T20:14:36.000+0100},
address = {Shanghai, China},
author = {Breu, Silvia and Zimmermann, Thomas and Lindig, Christian},
biburl = {https://www.bibsonomy.org/bibtex/257e35e4ddd2f6c2af2c77bb4bc1b4534/neilernst},
booktitle = {International workshop on Mining software repositories},
interhash = {9b29485dca365f73182d7447ba05f106},
intrahash = {57e35e4ddd2f6c2af2c77bb4bc1b4534},
keywords = {evolution msr},
pages = {94--97},
publisher = {ACM},
timestamp = {2009-03-06T20:14:36.000+0100},
title = {Mining eclipse for cross-cutting concerns},
url = {http://portal.acm.org/citation.cfm?id=1138006},
year = 2006
}