Hidden messages: evaluating the efficiency of code elision in program navigation
نویسندگان
چکیده
Text elision is a user interface technique that aims to improve the efficiency of navigating through information by allowing regions of text to be ‘folded’ into and out of the display. Several researchers have argued that elision interfaces are particularly suited to source code editing because they allow programmers to focus on relevant code regions while suppressing the display of irrelevant information. Elision features are now appearing in commercial systems for software development. There is, however, a lack of empirical evidence of the technique’s efficiency. This paper presents an empirical evaluation of source code elision using a Java program editor. The evaluation compared a normal ‘flat text’ editor with two versions that diminished elided text to levels that were ‘just legible’ and ‘illegible’. Performance was recorded in four tasks involving navigation through programs. Results show that programmers were able to complete their tasks more rapidly when using the elision interfaces, particularly in larger program files. Although several participants indicated a preference for the ‘just legible’ elision interface, performance was best with illegible elision.
منابع مشابه
Hidden Messages: Evaluating the Effectiveness of Code Elision in Program Navigation
Text elision is a user interface technique that aims to improve the efficiency of navigating through information by allowing regions of text to be ‘folded’ into and out of the display. Several researchers have argued that elision interfaces are particularly suited to source code editing because they allow programmers to focus on relevant code regions while suppressing the display of irrelevant ...
متن کاملReverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages
Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...
متن کاملبررسی تاثیر استفاده از تبلیغات پنهان بر قصد خرید مشتریان مبتنی بر نقش تعدیل گری متغیر جمعیت شناختی جنسیت و متغیر شهرت برند
Today, organizations, with the help of various advertising media, in order to identify and introduce their goods and services and declare their distinction with similar goods, are trying to send influential messages in order to encourage audiences to buy, and on the other hand, people are faced with a variety of advertising by a variety of media channels available at any time and place; this ha...
متن کاملSpeech enhancement based on hidden Markov model using sparse code shrinkage
This paper presents a new hidden Markov model-based (HMM-based) speech enhancement framework based on the independent component analysis (ICA). We propose analytical procedures for training clean speech and noise models by the Baum re-estimation algorithm and present a Maximum a posterior (MAP) estimator based on Laplace-Gaussian (for clean speech and noise respectively) combination in the HMM ...
متن کاملFrom Lightweight Hardware Transactional Memory to Lightweight Lock Elision
AMD’s Advanced Synchronization Facility (ASF) has been evaluated in earlier work in the context of hardware and hybrid transactional memory, software transactional memory, and lock-free programming. In this work, we describe an extension to ASF for applying it in the area of lock elision (LE), which is now a well established concept in academia, but has not found its way into mainstream micro-p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Interacting with Computers
دوره 15 شماره
صفحات -
تاریخ انتشار 2003