Mining Crosscutting Concerns through Random Walks

被引:7
|
作者
Zhang, Charles [1 ]
Jacobsen, Hans-Arno [2 ,3 ]
机构
[1] Hong Kong Univ Sci & Technol, Dept Comp Sci & Engn, Kowloon, Hong Kong, Peoples R China
[2] Univ Toronto, Bell Univ Lab, Comp Engn Grp, Middleware Syst Res Grp,Dept Elect & Comp Engn, Toronto, ON M5S 3G4, Canada
[3] Univ Toronto, Dept Comp Sci, Toronto, ON M5S 3G4, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Aspect mining; mining crosscutting concerns; MIDDLEWARE;
D O I
10.1109/TSE.2011.83
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Inspired by our past manual aspect mining experiences, this paper describes a probabilistic random walk model to approximate the process of discovering crosscutting concerns (CCs) in the absence of the domain knowledge about the investigated application. The random walks are performed on the concept graphs extracted from the program sources to calculate metrics of "utilization" and "aggregation" for each of the program elements. We rank all the program elements based on these metrics and use a threshold to produce a set of candidates that represent crosscutting concerns. We implemented the algorithm as the Prism CC miner (PCM) and evaluated PCM on Java applications ranging from a small-scale drawing application to a medium-sized middleware application and to a large-scale enterprise application server. Our quantification shows that PCM is able to produce comparable results (95 percent accuracy for the top 125 candidates) with respect to the manual mining effort. PCM is also significantly more effective as compared to the conventional approach.
引用
收藏
页码:1123 / 1137
页数:15
相关论文
共 50 条
  • [1] Mining execution relations for crosscutting concerns
    Krinke, J.
    [J]. IET SOFTWARE, 2008, 2 (02) : 65 - 78
  • [2] Mining control flow graphs for crosscutting concerns
    Krinke, Jens
    [J]. 13TH WORKING CONFERENCE ON REVERSE ENGINEERING PROCEEDINGS, 2006, : 334 - 342
  • [3] Mining composite crosscutting concerns based on graph clustering
    709 Research Institute, China Shipbuilding Industry Corporation, Wuhan
    430074, China
    不详
    430074, China
    不详
    430074, China
    [J]. Huazhong Ligong Daxue Xuebao, 4 (118-122):
  • [4] A Comparison of Approaches to Legacy System Crosscutting Concerns Mining
    Chen, Tong
    He, Chengwan
    [J]. 2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 813 - 816
  • [5] Mining Crosscutting Concerns with ComSCId: A Rule-Based Customizable Mining Tool
    Parreira Junior, Paulo Afonso
    Mendes, Wilian
    de Camargo, Valter Vieira
    Dellosso Penteado, Rosangela Aparecida
    Xavier Costa, Heitor Augustus
    [J]. 2012 XXXVIII CONFERENCIA LATINOAMERICANA EN INFORMATICA (CLEI), 2012,
  • [6] On A Top Down Aspect Mining Approach for Monitoring Crosscutting Concerns Identification
    Cojocar, Grigoreta-Sofia
    Guran, Adriana-Mihaela
    [J]. 2017 IEEE 14TH INTERNATIONAL SCIENTIFIC CONFERENCE ON INFORMATICS, 2017, : 51 - 56
  • [7] A classification of crosscutting concerns
    Marin, M
    Moonen, L
    van Deursen, A
    [J]. ICSM 2005: PROCEEDINGS OF THE 21ST IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, 2005, : 673 - 676
  • [8] Mining static and dynamic crosscutting concerns: a role-based approach
    Bernardi, Mario Luca
    Cimitile, Marta
    Di Lucca, Giuseppe
    [J]. JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2016, 28 (05) : 306 - 339
  • [9] Mining Coding Patterns to Detect Crosscutting Concerns in Java']Java Programs
    Ishio, Takashi
    Date, Hironori
    Miyake, Tatsuya
    Inoue, Katsuro
    [J]. FIFTEENTH WORKING CONFERENCE ON REVERSE ENGINEERING, PROCEEDINGS, 2008, : 123 - 132
  • [10] Modularizing Crosscutting Concerns with Ptolemy
    Rajan, Hridesh
    Leavens, Gary T.
    Dyer, Robert
    Bagherzadeh, Mehdi
    [J]. AOSD 2011 PROCEEDINGS AND COMPANION MATERIAL, 2011, : 61 - 62