期刊文献+

基于源代码挖掘的软件质量改进方法研究 被引量:3

Improving Software Quality Based-on Code Mining Technology
在线阅读 下载PDF
导出
摘要 代码搜索引擎(code search engines,CSE)产生和互联网上日益增加的开源代码工程,使得软件开发人员在软件开发的过程中可以大量的重用已有的源代码。然而大部分开发人员使用CSEs只是简单完成相关代码搜索。该文给出了一种通用的范型挖掘过程模型,能够充分利用CSEs,通过挖掘源代码范型保证重用代码的质量,并详细的说明了该范型挖掘过程模型在三个方面辅助软件质量改进。 A amount of open source code is available on the Intemet and various code search engines (CSE) are available to serve as a means for searching in open source code. However, usage of CSEs is often limited to simple tasks such as searching for relevant code ex- amples. In this paper, we present a generic model that can be used to improve software quality by exploiting CSEs. We present three example software development tasks that can be assisted by our life-cycle model and show how these three tasks can contribute to improve the software quality.
作者 楚燕婷 王丽琼 CHU Yan-ting, WANG Li-qiong(1 School of Computer and Technology, University of South China, Hengyang 421001, China; 2.School of Economics & Management, University of South China, Hengyang 421001, China)
出处 《电脑知识与技术》 2009年第12期9771-9772,共2页 Computer Knowledge and Technology
关键词 代码搜索 代码挖掘 软件质量改进 code searching code Mining improving software quality
  • 相关文献

参考文献1

二级参考文献34

  • 1ENGLER D, CHEN D Y, HALLEM S, et al. Bugs as deviant behavior: A general approach to inferring errors in systems code [ J]. ACM SIGOPS Operating Systems Review, 2001, 35(5) : 57 -72.
  • 2LI ZHEN-MIN, ZHOU YUAN-YUAN. PR-Miner: Automatically extracting implicit programming rules and detecting violations in large software code [ J]. ACM SIGSOFT Software Engineering Notes, 2005, 30(5): 306-315.
  • 3TAN LIN, ZHANG XIAO-LAN, MA XIAO, et al. AutolSES: Automatically inferring security specification and detecting violations [ C]// Proceedings of the 17th Conference on Security Symposium. Berkeley, CA: USENIX Association, 2008:379-394.
  • 4LI ZHEN-MIN, LU SHAN, MYAGMAR S, et al. CP-Miner: A tool for finding copy-paste and related bugs in operating system code [ C]//Proceedings of the 6th Conference on Symposium on Operating Systems Design and Implementation. Berkeley, CA: USENIX Association, 2004:20-20.
  • 5LINDIG C. Mining patterns and violations using concept analysis [ R]. Saarbrticken, Germany: Saarland University, 2007.
  • 6TAN LIN, YUAN DING, KRISHNA G, et al. / * iComment: Bugs or bad comments? */ [ C]// SOSP'07: Proceedings of 21st ACM SIGOPS Symposium on Operating Systems Principles. New York: ACM Press, 2007:145 - 158.
  • 7GANAPATHY V, KING D, JAEGER T, et al. Mining security-sensitive operations in legacy code using concept analysis [ C]// Proceedings of the 29th International Conference on Software Engineering. Washington, DC: IEEE Computer Society, 2007:458-467.
  • 8MARTIN E, XIE TAO. Understanding software application interfaces via string analysis [ C]//Proceedings of the 28th International Conference on Software Engineering. New York: ACM .Press, 2006:901-904.
  • 9WASYLKOWSKI A, ZELLER A, LINDIG C. Detecting object usage anomalies [ C]//Proceedings of the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering. New York: ACM Press, 2007:35-44.
  • 10SHOHAM S, YAHAV E, FINK S, et al. Static specification mining using automata-based abstractions [ C]// Proceedings of the 2007 International Symposium on Software Testing and Analysis. New York: ACM Press, 2007:174 - 184.

同被引文献7

引证文献3

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部