Detecting Design Rule Violations

نویسندگان

  • Sunny Wong
  • Yuanfang Cai
  • Miryung Kim
  • Michael Dalton
چکیده

In this paper, we present an approach to detect design rule violations that could cause software defects, modularity decay, or expensive refactorings. Our approach is to compute the discrepancies between how components should change together based on the modular structure framed by design rules, and how components actually changed together revealed by how modification requests were fulfilled. Our contributions include a design violation detection framework and a design-rule based impact scope prediction algorithm. We evaluated our approach using the version history of three large-scale open source software projects. We examined all identified violations to check whether they were refactored or recognized by the developers in later versions. Our results show that (1) on average 73% of the violations we identified were either recognized or refactored in later releases (when using .5 confidence and varying support from 2 to 10 in Hadoop); (2) our approach can identify problematic design violations much earlier than manual identification by developers; and (3) the identified violations cover multiple bad smells, such as tight coupling and code clone.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting Design Defects Caused by Design Rule Violations

Research has shown that unintended violations of dependencies can incur modularity decay, higher maintenance cost, and software defects. However, dependency violations may be undetected by traditional software verification and validation techniques. In this paper, we present an approach to detect potential design defects caused by the violation of design rules. We identify the patterns of how d...

متن کامل

Data Structures for Reporting Extension Violations in a Query Range

Design Rule Checking (DRC) in VLSI design involves checking if a given VLSI layout satisfies a given set of rules, and reporting the violations if any. We propose data structures for reporting violations of the minimum extension rule in a query window of

متن کامل

Analysis of the effect of "ignorance" on realization The "Al-Dar" rule In the legislative and judicial system of Iran

In penal systems, presumption of knowledge of law and its probative value have lost its general function,Due to relatively numerous exceptions and violations of justice and fairness. In the Islamic Penal Code adopted in 2013,Because of the connection between ignorance and another category called "Suspicion",There is more flexibility in accepting ignorance as a legal excuse.However,in Articles 1...

متن کامل

Improving the Automated Detection and Analysis of Secure Coding Violations

vii 1 Background 1 1.1 Software Security 1 1.2 SCALe 2 2 Approach 3 2.1 Research Questions 3 2.2 Methodology 3 2.2.1 Use of the SCALe Process 3 2.2.2 Data for Research 5 2.2.3 Define and Describe the Various Performance Measures Statistics 8 3 Results 10 3.1 What Analyzers Are Best at Detecting Specific Coding Rule Violations? 10 3.2 How Common Are Violations of Secure Coding Rules in Systems D...

متن کامل

Continuous punishment and the potential of gentle rule enforcement.

The paper explores the conditions that determine the effect of rule enforcement policies that imply an attempt to punish all the visible violations of the rule. We start with a simple game-theoretic analysis that highlights the value of gentle COntinuous Punishment (gentle COP) policies. If the subjects of the rule are rational, gentle COP can eliminate violations even when the rule enforcer ha...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010