Reading Behavior and Comprehension of C plus plus Source Code - A Classroom Study

被引:2
|
作者
Saddler, Jonathan A. [1 ]
Peterson, Cole S. [1 ]
Peachock, Patrick [2 ]
Sharif, Bonita [1 ]
机构
[1] Univ Nebraska, Lincoln, NE 68588 USA
[2] Youngstown State Univ, Youngstown, OH 44555 USA
来源
AUGMENTED COGNITION, AC 2019 | 2019年 / 11580卷
关键词
Eye tracking; Program comprehension; Expertise; Gaze transitions;
D O I
10.1007/978-3-030-22419-6_43
中图分类号
B84 [心理学]; C [社会科学总论]; Q98 [人类学];
学科分类号
03 ; 0303 ; 030303 ; 04 ; 0402 ;
摘要
This paper presents an eye-tracking study conducted in a classroom setting with seventeen students enrolled in a Computer Science program. The students were a mix of twelve first-year undergraduates (novices) and five masters students (non-novices). Students were asked to answer a comprehension question for each of thirteen C++ programs after reading them. Each program is split into a series of chunks which logically break down meaningful parts where eye gazes hint at cognition about parts of programs useful to solving problems. We analyze these patterns across chunks for the stories they tell about how participants went about searching for cues, and to learn whether their gaze patterns predicted accurate answers to three types of questions The results show that novices tend to visit print output statements and declaration statements the same amount as they do other statements in code with the exception of control block headers, which both groups tend to focus on the most across all categories. We also find that non-novices spend longer fixating inside of chunks of code before transitioning to other chunks, and tend to transition to chunks that are further away from their original position than novices.
引用
收藏
页码:597 / 616
页数:20
相关论文
共 50 条
  • [21] Evolution of Code Clone Ratios throughout Development History of Open-Source C and C plus plus Programs
    Goon, Anfernee
    Wu, Yuhao
    Matsushita, Makoto
    Inoue, Katsuro
    2017 IEEE 11TH INTERNATIONAL WORKSHOP ON SOFTWARE CLONES (IWSC), 2017, : 47 - 53
  • [22] Cloud-Based Source Code Security and Vulnerabilities Analysis Tool for C/C plus plus Software Systems
    Crifasi, Elliott
    Pike, Sean
    Stuedemann, Zechariah
    Alnaeli, Saleh M.
    Altahat, Zaid
    2018 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY (EIT), 2018, : 651 - 654
  • [23] Generate Test Data from C/C plus plus Source Code using Weighted CFG and Boundary Values
    Tran Nguyen Huong
    Do Minh Kha
    Hoang-Viet Tran
    Pham Ngoc Hung
    2020 12TH INTERNATIONAL CONFERENCE ON KNOWLEDGE AND SYSTEMS ENGINEERING (IEEE KSE 2020), 2020, : 97 - 102
  • [24] A C/C plus plus Source-to-Source Compiler for dependable applications
    Benso, A
    Chiusano, S
    Prinetto, P
    Tagliaferri, L
    DSN 2000: INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2000, : 71 - 78
  • [25] Code Reviews in C plus plus Preliminary Results from an Eye Tracking Study
    Hauser, Florian
    Schreistetter, Stefan
    Reuter, Rebecca
    Mottok, Juergen
    Gruber, Hans
    Holmqvist, Kenneth
    Schorr, Nick
    ETRA 2020 SHORT PAPERS: ACM SYMPOSIUM ON EYE TRACKING RESEARCH & APPLICATIONS, 2020,
  • [26] An Empirical Study of C plus plus Vulnerabilities in Crowd-Sourced Code Examples
    Verdi, Morteza
    Sami, Ashkan
    Akhondali, Jafar
    Khomh, Foutse
    Uddin, Gias
    Motlagh, Alireza Karami
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2022, 48 (05) : 1497 - 1514
  • [27] Extraction and Visualization of Call Dependencies for Large C/C plus plus Code Bases: A Comparative Study
    Telea, Alexandru
    Hoogendorp, Hessel
    Ersoy, Ozan
    Reniers, Dennie
    2009 5TH IEEE INTERNATIONAL WORKSHOP ON VISUALIZING SOFTWARE FOR UNDERSTANDING AND ANALYSIS, 2009, : 81 - +
  • [28] Transient Simulation of Speed-No Load Conditions With An Open-Source Based C plus plus Code
    Casartelli, E.
    Mangani, L.
    Romanelli, G.
    Staubli, T.
    27TH IAHR SYMPOSIUM ON HYDRAULIC MACHINERY AND SYSTEMS (IAHR 2014), PTS 1-7, 2014, 22
  • [29] Clava: C/C plus plus source-to-source compilation using LARA
    Bispo, Joao
    Cardoso, Joao M. P.
    SOFTWAREX, 2020, 12
  • [30] Vulnerable C/C plus plus Code Usage in IoT Software Systems
    Alnaeli, Saleh M.
    Sarnowski, Melissa
    Aman, Md Sayedul
    Abdelgawad, Ahmed
    Yelamarthi, Kumar
    2016 IEEE 3RD WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2016, : 348 - 352