Detecting, Tracing, and Monitoring Architectural Tactics in Code

被引:58
|
作者
Mirakhorli, Mehdi [1 ]
Cleland-Huang, Jane [2 ]
机构
[1] Rochester Inst Technol, Dept Software Engn, Rochester, NY 14623 USA
[2] Depaul Univ, Sch Comp, Chicago, IL 60604 USA
基金
美国国家科学基金会;
关键词
Architecture; traceability; tactics; traceability information models; DESIGN; TRACEABILITY; RECOVERY; CLASSIFICATION;
D O I
10.1109/TSE.2015.2479217
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Software architectures are often constructed through a series of design decisions. In particular, architectural tactics are selected to satisfy specific quality concerns such as reliability, performance, and security. However, the knowledge of these tactical decisions is often lost, resulting in a gradual degradation of architectural quality as developers modify the code without fully understanding the underlying architectural decisions. In this paper we present a machine learning approach for discovering and visualizing architectural tactics in code, mapping these code segments to tactic traceability patterns, and monitoring sensitive areas of the code for modification events in order to provide users with up-to-date information about underlying architectural concerns. Our approach utilizes a customized classifier which is trained using code extracted from fifty performance-centric and safety-critical open source software systems. Its performance is compared against seven off-the-shelf classifiers. In a controlled experiment all classifiers performed well; however our tactic detector outperformed the other classifiers when used within the larger context of the Hadoop Distributed File System. We further demonstrate the viability of our approach for using the automatically detected tactics to generate viable and informative messages in a simulation of maintenance events mined from Hadoop's change management system.
引用
收藏
页码:206 / 221
页数:16
相关论文
共 50 条
  • [1] ArchTacRV: Detecting and Runtime Verifying Architectural Tactics in Code
    Ge, Ning
    Wang, Ze
    Zhang, Li
    Zhao, Jiuang
    Zhou, Yufei
    Liu, Zewei
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION AND REENGINEERING (SANER 2022), 2022, : 566 - 576
  • [2] Does BERT Understand Code? - An Exploratory Study on the Detection of Architectural Tactics in Code
    Keim, Jan
    Kaplan, Angelika
    Koziolek, Anne
    Mirakhorli, Mehdi
    [J]. SOFTWARE ARCHITECTURE (ECSA 2020), 2020, 12292 : 220 - 228
  • [3] A Program Synthesis Approach for Adding Architectural Tactics to An Existing Code Base
    Shokri, Ali
    [J]. 2021 36TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING ASE 2021, 2021, : 1388 - 1390
  • [4] Can Latent Topics in Source Code Predict Missing Architectural Tactics?
    Gopalakrishnan, Raghuram
    Sharma, Palak
    Mirakhorli, Mehdi
    Galster, Matthias
    [J]. 2017 IEEE/ACM 39TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2017, : 15 - 26
  • [5] A method for detecting and measuring architectural layering violations in source code
    Sarkar, Santonu
    Rama, Girish Maskeri
    Shubha, R.
    [J]. ASPEC 2006: 13TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2006, : 165 - +
  • [6] Inferring Architectural Evolution from Source Code Analysis A Tool-Supported Approach for the Detection of Architectural Tactics
    Kapto, Christel
    El Boussaidi, Ghizlane
    Kpodjedo, Segla
    Tibermacine, Chouki
    [J]. SOFTWARE ARCHITECTURE, ECSA 2016, 2016, 9839 : 149 - 165
  • [7] Analysing Tactics in Architectural Patterns
    Sanchez, Alejandro
    Aguiar, Ademar
    Barbosa, Luis S.
    Riesco, Daniel
    [J]. PROCEEDINGS OF THE 2012 IEEE 35TH SOFTWARE ENGINEERING WORKSHOP (SEW 2012), 2012, : 32 - 41
  • [8] Revisiting Architectural Tactics for Security
    Fernandez, Eduardo B.
    Astudillo, Hernan
    Pedraza-Garcia, Gilberto
    [J]. SOFTWARE ARCHITECTURE (ECSA 2015), 2015, 9278 : 55 - 69
  • [9] Service Violation Monitoring Model for Detecting and Tracing Bandwidth Abuse
    Abdulghani Ali Ahmed
    Aman Jantan
    Mohammed Rasmi
    [J]. Journal of Network and Systems Management, 2013, 21 : 218 - 237
  • [10] Service Violation Monitoring Model for Detecting and Tracing Bandwidth Abuse
    Ahmed, Abdulghani Ali
    Jantan, Aman
    Rasmi, Mohammed
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2013, 21 (02) : 218 - 237